ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-891067DE9E4C
|
Infrastructure Scan
ADDRESS: 0x06893f441749bd024c811c7d99766a27f9446d63
DEPLOYED: 2026-05-10 23:50:23
LAST_TX: 2026-05-11 00:25:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 0083232B. [NET] Fetching raw bytecode for 0x06893f441749bd024c811c7d99766a27f9446d63… [FETCH] Entry point found at offset 0x3077. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Reverting transaction at PC: 6188… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: a24e9bbc…990bd598.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa58400d6c697d249897decc7821097030bd18e65 0x48cebc2d709c865cdebe3f75abcbdb0c5b365e82 0xbc86e51c05de561242a5048da7771350f0aaf6f5 0x297b20759553bde999e96ec26a81ee1d072e4979 0xf5d1da48855052a5a17c0f35ddf4eebf826ca5d0 0x79cefae6df40e56f16343a4a617d3b3f846fc483 0x6aeb455e1045807bd1f288198a265e3f6e1c9d47 0xa05fa8443813b27f01cd5f6395f763ed10777db2 0xea7d38e4efd8051d91d4957fcbfd7fcb49affe75 0x57e22242a72010e3e95f51114e2ecca3413ee560 0xab66bfdb88ee71883b7ae8daaa6fc32d40ea0036 0x4557ccd5f58f5ab93fe611d8c51d4ef7b7e0f50a 0xa74bbe995f73f900c7ba1e678c8f2ed1022613a6 0x5ac41ff5861991dc961dc86d77edef9df2268bd4 0x53c448ad1ce48999aa307b0bf13becfd9eb35a7c 0xa54b61109006ce028ba2d83e9452261536fe3520 0xc8cc7b69af1ac61c523572e3d063c7c67cd6f26f 0xb6243583a8c74c973bef6de9e8526ec881980db1 0x35a7f7928ffaa24395a6c90ba556d31232c24730 0x9f1d598ae7622b626a9bff198062289cdc3387d1

